Author of the publication

Arbitrary Two-Pattern Delay Testing Using a Low-Overhead Supply Gating Technique.

, , , and . J. Electron. Test., 24 (6): 577-590 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ENFIRE: An Energy-efficient Fine-grained Spatio-temporal Reconfigurable Computing Fabric (Abstact Only)., , , and . FPGA, page 275. ACM, (2016)Modeling and Analysis of Loading Effect in Leakage of Nano-Scaled Bulk-CMOS Logic Circuits, , and . CoRR, (2007)Internet of Things security: Are we paranoid enough?. ICCE, page 1. IEEE, (2018)Eat, but Verify: Low-Cost Portable Devices for Food Safety Analysis., , , , and . IEEE Consumer Electronics Magazine, 8 (1): 12-18 (2019)Statistical Modeling of Pipeline Delay and Design of Pipeline under Process Variation to Enhance Yield in sub-100nm Technologies, , , , and . CoRR, (2007)An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (6): 1010-1038 (2021)Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing., , , , and . CoRR, (2021)Resilient System-on-Chip Designs With NoC Fabrics., , , and . IEEE Trans. Inf. Forensics Secur., (2020)On-Chip Batteries as Distributed Energy Sources in Heterogeneous 2.5D/3D Integrated Circuits., , , , and . IEEE Access, (2023)SCOPE: Synthesis-Based Constant Propagation Attack on Logic Locking., , and . IEEE Trans. Very Large Scale Integr. Syst., 29 (8): 1529-1542 (2021)